QUESTION 53A CMS plugin creates two files that are accessible from the Internet myplugin.html and exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific variables to exploitable.php. You see traffic to your webserver that consists of only HTTP GET requests to myplugin.html. Which category best describes this activity?

QUESTION 59From a security perspective, why is it important to employ a clock synchronization protocol on a network?

A. so that everyone knows the local timeB. to ensure employees adhere to work scheduleC. to construct an accurate timeline of events when responding to an incidentD. to guarantee that updates are pushed out according to schedule

Answer: D

QUESTION 60Refer to the exhibit. Which type of log is this an example of?